Use-after-free in Javascript Proxy objects

Related Vulnerabilities: CVE-2013-0756  

Mozilla Foundation Security Advisory 2013-19

Use-after-free in Javascript Proxy objects

Announced
January 8, 2013
Reporter
regenrecht
Impact
Critical
Products
Firefox, Firefox ESR, SeaMonkey, Thunderbird, Thunderbird ESR
Fixed in
  • Firefox 18
  • Firefox ESR 17.0.2
  • SeaMonkey 2.15
  • Thunderbird 17.0.2
  • Thunderbird ESR 17.0.2

Description

Security researcher regenrecht reported, via TippingPoint's Zero Day Initiative, a garbage collection flaw in Javascript Proxy objects. This can lead to a use-after-free leading to arbitrary code execution.

In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.

References